Many organizations have adopted cloud computing, BYOD practices and expanded the use of social media, all of which require new technologies and security policies. Without changes, the security of a company is probably inadequate. Companies are concerned about managing and privacy of data entrusted to service providers. It is unclear whether this is due to…

Organizations are more than ever exposed to a large number and variety of threats and risks to cyber security. Big Data will be one of the main elements of change in the enterprises by supplying intelligence-driven models. Research firm Gartner said that big data analytics will play a crucial role in detecting crime and security…

A series of cyber-assaults have recently targeted various banks all over the United States. A type of malware dubbed ‘itsokaynoproblembro’ or Brobot has reportedly been in action for a number of years, operating under the radar of various anti-virus programs. However, it is only recently that the virus has directly affected the cloud platforms and…

Security and compliance concerns are still major stumbling blocks to cloud adoption. According to a study by security firm Lieberman Software, nearly 48% of members of teams in business fear of government and legal interference before putting sensitive data in the cloud. This is a survey to close more than 300 IT professionals who revealed…

A global survey has shown that it is very common that companies of all sizes suffer damage due to the use of public cloud applications that are not managed or integrated within the company’s IT infrastructure. Symantec has released the results of a survey conducted by ReRez in the months of September and October 2012…

Cloud computing technology is one of the most transformative technologies in recent history, as it allows computers to perform tasks that are normally beyond their computing and storage capabilities. We have also seen that the amount of web applications available has increased rapidly as the consumer market starts to accept cloud computing. Everything from document…

Phishing is a popular scam to bait internet users into providing private information. It usually acquires information for the purpose of identity theft. A “phisher” usually sends emails to various individuals and claims to be a legitimate entity. People are duped into providing their personal information, mostly of financial nature, because they believe that the…